In the last days I’ve been moving this blog from and to blogger to make some tests.
In the end, it can be accessed via my website as well.
Related Posts

ISO27001 and GDPR
We are talking about Article 32 of GDPR: https://gdpr-info.eu/art-32-gdpr/ It basically says that you should have some measures in place in order to protect customer data by reducing the risk of a customer data to be lost or stolen(through a data breach, through classical theft, losing drives, making information public unintentionally an so on). […]
Share this:
- Click to share on LinkedIn (Opens in new window) LinkedIn
- Click to share on Facebook (Opens in new window) Facebook
- Click to share on Telegram (Opens in new window) Telegram
- Click to share on X (Opens in new window) X
- Click to share on Threads (Opens in new window) Threads
- Click to share on Mastodon (Opens in new window) Mastodon
- Click to share on Bluesky (Opens in new window) Bluesky
- More
Planned cyberattack attack against the USA infrastructure
After the #OpIsrael against Israel cyberspace, anonymous hackers called themselves “N4m3le55 Cr3w” announced that they have scheduled another cyber attack on USA based websites and servers on 07/05/2013. In the above mentioned text it is also explain what the reason for the attack is: “war crimes in Iraq, Afghanistan and Pakistan“. Also noteworthy is that the activists also explain which means […]
Share this:
- Click to share on LinkedIn (Opens in new window) LinkedIn
- Click to share on Facebook (Opens in new window) Facebook
- Click to share on Telegram (Opens in new window) Telegram
- Click to share on X (Opens in new window) X
- Click to share on Threads (Opens in new window) Threads
- Click to share on Mastodon (Opens in new window) Mastodon
- Click to share on Bluesky (Opens in new window) Bluesky
- More
Security 101: December 2012
How safe is internet banking when I am using a smartphone to do it? I noticed several banks provided apps to do mobile internet banking and share trading but does it really work? Smartphones have much limited security functionality than desktops. However, they do share one weakness: they are both equally exposed to external attacks if they transmit non-encrypted data over non-encrypted Internet […]
Share this:
- Click to share on LinkedIn (Opens in new window) LinkedIn
- Click to share on Facebook (Opens in new window) Facebook
- Click to share on Telegram (Opens in new window) Telegram
- Click to share on X (Opens in new window) X
- Click to share on Threads (Opens in new window) Threads
- Click to share on Mastodon (Opens in new window) Mastodon
- Click to share on Bluesky (Opens in new window) Bluesky
- More
You must be logged in to post a comment.